Difference between revisions of "Flipbook XOR Pad"

From DSiBrew
Jump to navigation Jump to search
Line 3: Line 3:
  
 
   00: F7 4C 6A 3A FB 82 A6 37 6E 11 38 CF A0 DD 85 C0
 
   00: F7 4C 6A 3A FB 82 A6 37 6E 11 38 CF A0 DD 85 C0
   10: C7 9B C4 D8 DD 28 8A 87 53 20 EE E0 0B BE B4 3A
+
   10: C7 9B C4 D8 DD 28 8A 87 53 20 EE E0 0B EB 43 A0
   20: 0D B5 5F 75 36 37 EB 35 6A 34 7F B5 0F 99 F7 EF
+
   20: DB 55 0F 75 36 37 EB 35 6A 34 7F B5 0F 99 F7 EF
   30: 43 25 CE A0 29 46 D9 D4 4D BB XX XX XX XX XX XX
+
   30: 43 25 CE A0 29 46 D9 D4 4D BB 04 XX XX XX XX XX

Revision as of 23:39, 15 August 2009

Since the encryption used is AES-128-CTR, there's a static XOR pad (generated from the key) applied when encrypting/decrypting. It repeats each 0x40 (what a fuck-up, Nintendo). Here's the XOR pad used for the *.lst file (hexadecimal):

 00: F7 4C 6A 3A FB 82 A6 37 6E 11 38 CF A0 DD 85 C0
 10: C7 9B C4 D8 DD 28 8A 87 53 20 EE E0 0B EB 43 A0
 20: DB 55 0F 75 36 37 EB 35 6A 34 7F B5 0F 99 F7 EF
 30: 43 25 CE A0 29 46 D9 D4 4D BB 04 XX XX XX XX XX